Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A networked approach to dynamic analysis of social system vulnerability., and . Journal of Intelligent and Fuzzy Systems, 28 (1): 189-197 (2015)Considering direct interaction of artificial ant colony foraging simulation and animation., , and . J. Exp. Theor. Artif. Intell., 24 (1): 95-107 (2012)Look-up table error correcting multiple pulse PPM codes for wireless optical communication channels optical wireless communications., , , and . IET Communications, 2 (1): 27-34 (2008)Vulnerability Analysis of Symbiosis Networks of Industrial Ecology Parks., , and . ITQM, volume 17 of Procedia Computer Science, page 965-972. Elsevier, (2013)A survival condition model of earthen sites based on the danger theory., , , , , , and . ICNC, page 354-362. IEEE, (2015)Fractal characteristics of very high resolution satellite imagery., , and . IGARSS, page 389-392. IEEE, (2007)An incremental approach for attribute reduction based on knowledge granularity., , , , , and . Knowl.-Based Syst., (2016)A deep learning method for lincRNA detection using auto-encoder algorithm., , and . BMC Bioinformatics, 18 (15): 73-81 (2017)Automatic Seismic Salt Interpretation with Deep Convolutional Neural Networks., , and . CoRR, (2018)DCEF: Deep Collaborative Encoder Framework for Unsupervised Clustering., , , , and . CoRR, (2019)